CVE-2025-40545

4.8 MEDIUM

📋 TL;DR

SolarWinds Observability Self-Hosted has an open redirection vulnerability where authenticated attackers can manipulate URLs to redirect users to malicious sites. This affects organizations running vulnerable versions of SolarWinds Observability Self-Hosted. The attack requires authentication and has high complexity, limiting immediate widespread exploitation.

💻 Affected Systems

Products:
  • SolarWinds Observability Self-Hosted
Versions: Versions prior to 2025.4.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects self-hosted deployments, not cloud/SaaS versions. Requires attacker to have valid authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could redirect users to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Limited phishing campaigns targeting authenticated users within affected organizations, potentially leading to credential theft from redirected sessions.

🟢

If Mitigated

With proper authentication controls and user awareness, impact is minimal as attackers need valid credentials and users should notice suspicious redirects.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires authenticated access and specific URL manipulation. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.4.1 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40545

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download SolarWinds Observability Self-Hosted version 2025.4.1 or later. 3. Run installer/upgrade following SolarWinds documentation. 4. Restart services as prompted. 5. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional URL validation at web application firewall or proxy level

User Awareness Training

all

Train users to verify URLs before entering credentials on redirected pages

🧯 If You Can't Patch

  • Implement strict access controls to limit authenticated user access to minimum necessary
  • Deploy web application firewall with URL validation rules to detect and block redirect attempts

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds Observability version in administration console. If version is earlier than 2025.4.1, system is vulnerable.

Check Version:

Check via SolarWinds web interface: Admin → About, or on server: Check installation directory version files

Verify Fix Applied:

Verify version shows 2025.4.1 or later in administration console and test URL redirection functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Multiple failed redirect attempts from single user sessions

Network Indicators:

  • HTTP 302/301 redirects to external domains from SolarWinds URLs
  • Unusual outbound connections following SolarWinds access

SIEM Query:

source="solarwinds" AND (http_status=302 OR http_status=301) AND url CONTAINS "redirect" AND NOT dest_ip IN internal_ranges

🔗 References

📤 Share & Export